A machine-non-readable defect is formed on a CD-ROM by re-modulation of a master cutting laser beam recorder. Re-modulation in specific program areas creates non-readable marks which interfere with any attempt to image-copy the CD-ROM. The non-machine-readable marks can be followed by valid data which may be used as keys to verify the authenticity of the CD-ROM. The machine-non-readable defect is invisible to the human eye to thwart detection and subsequent reverse engineering attempts.
|
15. A method for protecting against unauthorized copying of information on an optical medium comprising the steps of:
a) placing at least one mark at each of at least one corresponding predetermined location on an optical medium, which at least one location is within a continuous spiral track of said optical medium, which mark is incapable of being reproduced except by a mass reproduction recorder, and which mark, when read by a device adapted to read data contained in said continuous spiral track is incapable of being read, and, thereby prevents reading and of data following said mark and subsequent writing of said unread data on an optically recordable medium; b) adding an executable code module to said optical medium, said executable code module adapted to verify correctness of data following said mark contained on said optical medium.
1. A method for protecting against unauthorized copying of information on an optical medium comprising the steps of:
a) placing at least one mark at each of at least one corresponding predetermined location on an optical medium, which at least one location is within a continuous spiral track of said optical medium, which mark is incapable of being reproduced except by a mass reproduction recorder, and which mark, when read by a device adapted to read data contained in said continuous spiral track is incapable of being read, and, thereby prevents writing a copy of said mark on an optically recordable medium; b) adding an executable code module to said optical medium, said executable code module adapted to verify said at least one mark, and allow access to data and programs on said optical medium after said verification of said at least one mark.
2. The method defined by
3. The method defined by
4. The method defined by
a) determining whether an optical medium being read has said at least one mark at said at least one corresponding predetermined location; b) allowing access to information on said optical medium being read only if each of said at least one marks is determined to be at each of said at least one corresponding predetermined locations.
5. The method defined by
6. The method defined by
7. The method defined by
8. The method defined by
9. The method defined by
10. The method defined by
11. The method defined by
12. The method defined by
13. The method defined by
14. The method defined by
16. The method defined by
17. The method defined by
|
This invention relates to optical information storage disks. More particularly, to prevent access to counterfeit copies of such disks.
The software industry is at a crossroads at this time. More and more software is being delivered on compact disc (CD) for its cost effectiveness and ease of installation, ease of operation and the reduced cost of media and associated documentation. At the same time, the CD-Recordable industry is set to explode into the consumer market as prices for CD recorders are sharply decreasing. The cost of blank CD recordable media will also drop as more and more consumers purchase recorders and economy of scale manufacturing brings the cost down.
While taken individually these two trends are exciting and very beneficial for the consumer, together these two trends are troubling for the software publishing industry. CD recordable (CD-R) technology allows very cost effective duplication of CD products, referred to in the software industry as CD-ROM. Piracy is the predominant concern of all those who publish intellectually valuable content on CD-ROM, since it is now easily copyable onto a CD-R disc. The need therefore exists to make a CD-ROM uncopyable to thwart illegal piracy of its content.
The basic premise that is fundamental to the present invention is that the information recorded on CD-ROM and other CD media or optical media is laid out in a continuous spiral track. This track is usually (but not necessarily) read in a Constant Linear Velocity mode.
The mechanisms which read the data contained in these types of discs rely on the spiral track for not only for data, but also for tracking and location information as well. Mechanisms are built into the data recording standard which allow for defects in the media itself (defects from manufacturing as well as from misuse and damage/scratches) to be corrected. The mechanism to correct for defects is suited to defects which are characterized by certain physical and electrical limits. If these limits are exceeded, then the mechanism to correct errant data does not work. The result is an unreadable disc within the flaw causing a disruption. The disruption is enough to cause an error in the reader. This error is returned as unrecoverable and the read operation is disrupted. This disruption halts all attempts to copy data in the area within the defect.
This behavior works for copy protection because any attempt to image copy the optical media results in failure. The applications contained within an authorized copy of the optical disc can be made to work normally by making them aware of the flawed area on the disc. Since computer addressable readers like CD-ROM drives can jump discretely to any area of the disc, under software control, the flaw can be bypassed, allowing 100% functionality.
Therefore, by introducing defects selectively onto optical media such as CD-ROM, and making the applications contained within the media aware of the defects, a very effective copy protection process which is highly resistive to reverse engineering is created.
The present invention is a method and apparatus for making optical discs copy protected. The method requires that the software contained in the optical media be aware of defect in the optical media created by the method. By introducing special areas herein called the "MARK" on the media, and making the software contained within the media aware of the MARK, it is possible to thwart unauthorized copying of the optical media. The method is effective since the MARK is placed on the media via special manufacturing techniques hereinafter referred to as the "PROCESS." The PROCESS requires specialized equipment whose operations are difficult if not impossible, t:o reproduce using a conventional off-the-shelf desktop CD-Recorder. The software delivered in the media can be of any type, i.e. data or application. Access to the content of the media is established via executable code contained on the media which seeks and accesses the MARK. The software which is aware of the MARK is referred to herein as the "CODE".
The method exploits the way in which optical discs are read. For this explanation, a CD-ROM disc will be used, but the method applies to any optical medium with similar properties, i.e., having a focus servo loop, a tracking servo loop, and embedded error correction data which is used to compensate for missing or damaged data. The data on a CD-ROM is recorded on a spiral track. The spiral track is made up of a series of markings or pits which represent data. Referring to
The unique point of the method is that introduction of the MARK(S) into the spiral track does not interrupt the spiral track. The appearance to the human-eye of the MARK is no different than the appearance of a valid EFM pit pattern in adjacent areas to the MARK. By replacing valid EFM pit patterns in the MARK area, with periodic modulated laser pits, no visible discontinuity can be seen. By hiding the identity and location of the MARK areas, the additional benefit of increased security is added to the method.
The MARK is purposely created and introduced into the CD-ROM. In conjunction with a computer program, the MARK can be used to establish the validity and authenticity of the media, primarily because unauthorized copies would not contain the specific MARK contained in an authentic disc. Once validity of the MARK is established by the computer program, then access to the data contained within the CD-ROM can be granted.
The MARK is a special area on the media which is placed on the media during the mastering process. This MARK is difficult to reproduce by other than a LBR (laser beam recorder) used in mass CD-ROM manufacturing. The LBR is capable of maintaining constant linear velocity and spiral tracking without the need of feedback from the disc. This allows the creation of the MARK by modifying the modulation of the laser which is creating the pits. A desktop CD-recorder requires feedback from the media in the form of a tracking signal generated by a wobble track pre-formed on the blank media. Current generation CD-recorders are not designed to create the MARK. If the feedback is interrupted in any way, then tracking is affected adversely, and any record operation will fail. The technique should prove effective against mass duplication since a significant reverse engineering effort would be required to read the source disc in its entirety, in order to produce the master needed for mass duplication. In other words, even a factory set up to do mass duplication needs a master from which to make the necessary molds for the mass produced discs. The master must be created from the copy protected disc, which will create many difficulties in attempts to read 100% of the disc.
The MARK can be used alone, or with useful data immediately following the MARK. The valid data takes the form of a pattern (i.e. a sequence of binary numbers or ASCII characters) which are referred to herein as the "KEY." The KEY is generated or created in the same step as the CODE described later. The KEY is provided as a file (the KEY file) which ultimately will contain the MARK. The combination of the MARK and the KEY is referred to herein as the "SIGNATURE."
The MARK, although more straight forward to implement than the SIGNATURE, may require the CODE to be aware of the exact type of hardware used to read the CD-ROM. This is because different hardware react differently to an encounter with a MARK. Some hardware is capable of generating an error and recovering from the laser entering the MARK, but other hardware may not be able to recover from the laser entering the MARK, and entrance into the MARK may lock-up or disable further operation of the hardware, requiring possibly a re-boot or reset of the hardware. The SIGNATURE is much safer to implement on all hardware readers, since via program control, the laser is instructed to jump just past the MARK and begin reading the added valid data. In the case of the SIGNATURE, the reading and processing of the data following the MARK can be used to authenticate the contents of the CD-ROM. Multiple MARKS and/or SIGNATURES can be used on the disc for authentication to provide an increased level of security.
The MARK(S) and/or SIGNATURE(S) need to be in the data area of the CD-ROM. For this reason, they are created inside files which are used as containers. In other words, a file which has the MARK(S) and/or SIGNATURE(S) within its physical real-estate on the disc is considered to be MARKED and/or SIGNED. In most cases the MARKED and/or SIGNED file is unique and separate from the CODE, but it does not have to be. In some instances, the MARK(S) and/or SIGNATURE(S) can be placed inside either executable and/or data files. In doing so, very elaborate copy protection mechanisms can be developed by utilizing file-lengths, checksums, file placements, etc. Such layered copy protection mechanisms can be used alone or in conjunction with more simple mechanisms which only use separate and unique MARKED and/or SIGNED files.
Specific details showing the existence of a MARK 42 on a CD-ROM disc will now be explained with reference to
Specific details showing the existence of a SIGNATURE file 37 and MARK 42 will now be explained with reference to
The PROCESS is the actual steps involved in creating the MARK(S) and/or SIGNATURE(S). For explanation purposes, the creation of a SIGNATURE will be described. Since the SIGNATURE includes a MARK, the explanation includes the creation of the MARK. Also a separate and unique SIGNED file will be used for the explanation. A more detailed explanation of how MARK(S) and/or SIGNATURE(S) inside data and/or executable files will be discussed in the CODE explanation section below. In any case, MARK(S) and/or SIGNATURE(S) inside executable and/or data files are prepared the same way in the PROCESS.
First a CD-ROM image is created in the premastering process. The premastering process is where files are arranged and laid out according to a file-system specification such as ISO9660, HIGHSIERRA, HFS, etc. The image created includes files which contain the CODE. The CODE will be explained below, but the CODE contains instructions about the specific locations of any MARKS and/or SIGNATURES which should be on the disc. When the CD-ROM is premastered, one of two things must happen. Either a) the premastering process must specifically place files associated with the MARK(S) and/or SIGNATURE(S) at predetermined positions, or b) in the case that the CODE is very elaborate, no regard to position is necessary during premastering, since the CODE will determine the location of the MARK(S) and/or SIGNATURE(S) from path table and directory information which are created during the premastering process.
In the case of option (a) above, after the premastering process, the files which are MARKED and/or SIGNED now reside physically at a CD timecode location on the image. The image is then used to create either a CD-R master or a 1630 U-matic Tape as input to the cutting process. After the image is created, a table or list indicating the CD-timecode where the MARKED and/or SIGNED files are located is created. The locations on the table are used during the cutting process to create the MARK(S).
The MARK(S) are generated by switching the modulation of the LBRs laser. By switching from the CD encoder output to a free-running signal generator, the laser modulator can be forced to create a pattern on the spiral track which is similar in appearance to valid EFM pits, but contains no EFM. Modulating the laser with, for example, a sinusoidal oscillator at a frequency of 308.7 kHz a pit pattern which is inconspicuously similar to valid EFM is created. In actuality, any modulation value with frequencies from 720 kHz to 196 kHz will work as well. This frequency range corresponds to the frequencies which I3 signals thru I11 signals (described below) assume when placed on the media due to their respective duration periods. The clock timing signals in the decode circuitry used for playback are locked to the channel bit frequency of 4.3218 MHz (according to the compact disc audio and data specifications, the so-called Red and Yellow Books). Data on the disc is represented using a coding called EFM (eight-to-fourteen modulation). EFM is a code where each symbol of 8 data bits is mapped onto 14 channel bits. To each block of 14 channel bits, 3 extra bits are added for merging the blocks and for low frequency (LF) suppression. The information is contained in the positions of the transitions. For mapping 8 data bits, 256 combinations of channel bits are needed. The EFM code is generated in such a way that the minimum distance between 2 transitions is 3 channel bits (-1.5 data bits) and the sampling window (eye pattern) is 1 channel bit (-0.5 data bit). The maximum run length within the blocks is 11 channel bits (-5.5 data bits). It is possible to make 267 different patterns containing transitions in 14 channel bits with the requirement that Tmin=3 channel bits and Tmax=11 channel bits (the so called I3 thru I11 pit patterns). Only 256 patterns are needed, therefore 10 are skipped for concatenation reasons and 1 arbitrarily. Of these skipped patterns, 2 are reserved for control and display synchronization. The extra 3 bits do not need to contain a transition, so between the blocks, the requirements for Tmin can always be fulfilled. So for a Tmin value (I3) a respective frequency would be 4.3218 MHz/3=1.4406 MHz (this is a frequency for the half period, either positive or negative slope) so a further division by 2 yields 720.3 kHz. Similarly, for a Tmax value (I11) a respective frequency would be 4.3218 MHz/11=392.891 kHz (this is a frequency for the half period, either positive or negative slope) so a further division by 2 yields 196.45 kHz. By switching valid EFM with the sinusoidal modulation very quickly, using, for example, a logic gate, a seamless integration of the MARK(S) is made.
In the case of most LBRs, no provision is usually available to precisely trigger an event or operation at an exact CD timecode. For this reason, the development of a special CD timecode monitor is explained. This device is not necessary if there is a mechanism on the LBR which can precisely read the CD timecode of the pits being created at the laser output of the LBR. The ability to precisely read timecode is necessary in order to locate the MARK(S) at the predetermined location(s) which are derived from the table of timecodes generated in the premastering process.
In order to accomplish the switching accurately and quickly, an EFM decoder is used to give exact timecode values of the LBR laser output. Such an EFM decoder is commercially available (such as the Kenwood subcode analyzer which is capable of reading decoding and displaying the timecode located in the EFM signal). Otherwise a specially modified CD-ROM drive can act as an EFM decoder and at the same time provide a computer interface to read and process the timecode being decoded. Since a CD-ROM drive uses a laser to get an EFM pattern off a disc, by channeling an EFM signal from the LBR to the modified input section of a CD-ROM drive, it can be made to think the LBRs EFM is actually being read off a disc. The CD-ROM drive then acts as though it were reading a CD-ROM disc, and by utilizing the "GET TIMECODE" command for the drive, which is known in the art, a computer can read the timecode in the EFM signal. At this point, a program which has access to the decoded timecode values on the EFM, and the timecode values from the premastering, can be used to trigger a solid state switch connected to either the final modulator in the LBR laser path or the TTL electronic signal at the output of the EFM encoder. The solid state switch would then switch on the free running sinusoidal oscillator and drive the LBRs output. By switching between the oscillator and EFM, the MARK(S) can be created.
Referring now to
The CODE is a piece of software which is created and is either a stand-alone application, or is attached to an existing application program. The purpose of the CODE is to verify the MARK(S) and/or SIGNATURE(S) validity. Verification is done via access to the media, reading data off the media, and then comparing that data with data in the CODE. The CODE can be very simple, or it can be very elaborate. The complexity of the CODE is determined by the amount of security desired in the copy protection method.
The CODE is chronologically the first step in the PROCESS. The creation of the CODE determines where the MARK(S) and/or SIGNATURE(S) will be placed on the media. The CODE internally maintains specific information about where on the media to locate the MARK(S), and in the case of SIGNATURE(S), how to read the data which follows the MARK(S).
There are two ways in which the CODE can locate the MARK(S) and/or SIGNATURE(S) on the media. The first way is via hardcoding of the locations. The second is by filename resolution. Hard-coding means that unique and specific values for where to find the MARK(S) and/or SIGNATURE(S) on the media are maintained by the CODE. Filename resolution is where the CODE only maintains the name of the container file which holds the MARK(S) and/or SIGNATURE(S), the so-called MARKED and/or SIGNED file(s). The CODE then determines where the MARK(S) and/or SIGNATURE(S) are located by resolving the filename in the path table or file allocation table of the media. Filename resolution requires more effort and complexity on the part of the CODE, but it gives more freedom to placement of the MARK(S) and/or SIGNATURE(S). By using filename resolution, the premastering of the CD-ROM image is less complicated, i.e. files do not need to be placed at very specific addresses.
When run, the CODE looks internally for where to find the MARK(S) and/or SIGNATURE(S) and then goes to the media, seeks to the specified location(s) and reads data. Upon retrieval of data, a comparison is made between the data read and what should be a KEY indicating authenticity. If the KEY is authenticated, then the CODE proceeds with any more MARK(S) and/or SIGNATURE(S) that may remain. When all the MARK(S) and/or SIGNATURE(S) are authenticated, the CODE grants access to the media by allowing the application(s) which are associated with the media to run. If any of the MARK(S) and/or SIGNATURE(S) fail authentication, then the CODE assumes the media has been duplicated illegally, and prohibits the applications which are associated with the media to run. The CODE is created by a programmer who has access to source code for the application which is associated with the media. By adding program instructions to the application associated with media, the CODE is created. Concurrently, the KEY file(s) (which will be passed along to the premastering step) is created. The actual language of the CODE is determined by a) the integration of the new program instructions with the existing application, and b) the performance of, and hack-proofing of the KEY checking program instructions.
The KEY file takes on the form of at least 2352 (1 CD-ROM block) bytes which are reserved for the non-EFM pit pattern modulation, followed by as many bytes as required to store the KEY. So in the case that the KEY was 2352 bytes long, a total of 4704 bytes would be required for the KEY file. If CD-ROM drives could perfectly seek to exact addresses in one jump, then this would be the smallest size for a KEY file. CD-ROM drives, however, usually seek to a particular address by successive approximations. This means that the drive seeks to an earlier position than the target address by jumping across many spiral tracks at a time, then as the target address is near, settles into the spiral and follows it until the required address is reached. This seeking methodology would never reach the KEY in the KEY file because the MARK would always interfere. For this reason, a buffer zone between the MARK and the KEY needs to be included in the KEY file. This buffer zone becomes a landing area for the laser pickup as it is instructed to reach the KEY. The Yellow Book Specification which governs the CD-ROM media indicates that "the accuracy of the start and stop points depends on the player design." Since the player design determines at what point the optical pickup stops jumping tracks and settles into to the spiral, a sufficient buffer zone to land the pickup from a track jumping seek is required. Experimental results have shown that 150 CD-ROM sectors is sufficient and accommodates most CD-ROM drives. With a value of 150 sectors as a buffer, now the minimum size for the KEY file becomes 1 sector for the MARK, 150 sectors for the buffer zone and 1 Sector for the KEY (equal to 152 sectors or 352800 bytes). The only other consideration for the KEY file size is the accuracy of the switching in the PROCESS from valid EFM to sinusoidal modulation. If the switching time is long, or if propagation delays skew or affect the switching position, then additional buffering may be required to compensate for PROCESS deficiencies. Additional buffering may be required in the case of PROCESS deficiencies before the location of the MARK and after the MARK.
Patent | Priority | Assignee | Title |
11156481, | Dec 28 2016 | Michael, Naor | Optical encoder system and method |
6768709, | Feb 23 2000 | Acacia Research Group LLC | Hiding digital data in a digital audio or video carrier signal |
6902111, | Nov 12 1998 | Method and apparatus for impeding the counterfeiting of discs | |
7061594, | Nov 09 2000 | VINDUR TECHNOLOGIES, INC | Disc drive system and methods for use with bio-discs |
7200088, | Jan 11 2001 | VINDUR TECHNOLOGIES, INC | System and method of detecting investigational features related to a sample |
7221632, | Jul 12 2001 | VINDUR TECHNOLOGIES, INC | Optical disc system and related detecting methods for analysis of microscopic structures |
7239584, | Jun 29 2000 | Rovi Solutions Corporation | Method and apparatus for protection of data carrying discs |
7263201, | Nov 14 2000 | Koninklijke Philips Electronics N V | Record carrier with watermark |
7414930, | Jun 29 2000 | Rovi Europe Limited | Method of accessing data on a copy protected data carrying disc |
7469831, | Jun 30 2004 | BARCLAYS BANK PLC, AS COLLATERAL AGENT | Laser-based method and system for processing targeted surface material and article produced thereby |
7801327, | Jul 10 2002 | Koninklijke Philips Electronics N.V. | Record carrier with watermark |
7916592, | May 09 2005 | The Invention Science Fund I, LLC | Fluid mediated disk activation and deactivation mechanisms |
7916615, | Jun 09 2005 | The Invention Science Fund I, LLC | Method and system for rotational control of data storage devices |
8032798, | Sep 09 2005 | The Invention Science Fund I, LLC | Data retrieval systems |
8089839, | Jun 19 2006 | The Invention Science Fund I, LLC | Method and system for fluid mediated disk activation and deactivation |
8099608, | May 09 2005 | The Invention Science Fund I, LLC | Limited use data storing device |
8121016, | May 09 2005 | The Invention Science Fund I, LLC | Rotation responsive disk activation and deactivation mechanisms |
8140745, | Sep 09 2005 | The Invention Science Fund I, LLC | Data retrieval methods |
8159925, | Aug 05 2005 | The Invention Science Fund I, LLC | Limited use memory device with associated information |
8218262, | May 09 2005 | The Invention Science Fund I, LLC | Method of manufacturing a limited use data storing device including structured data and primary and secondary read-support information |
8220014, | May 09 2005 | The Invention Science Fund I, LLC | Modifiable memory devices having limited expected lifetime |
8264928, | Jun 19 2006 | The Invention Science Fund I, LLC | Method and system for fluid mediated disk activation and deactivation |
8332724, | Sep 09 2005 | The Invention Science Fund I, LLC | Data retrieval systems |
8413258, | Nov 26 2007 | TAIYO YUDEN CO , LTD | Optical information recording medium, information recording method for optical information recording medium and optical information recording device |
8462605, | May 09 2005 | The Invention Science Fund I, LLC | Method of manufacturing a limited use data storing device |
8745347, | May 09 2005 | The Invention Science Fund I, LLC | Limited use data storing device |
9396752, | Aug 05 2005 | The Invention Science Fund I, LLC | Memory device activation and deactivation |
Patent | Priority | Assignee | Title |
4975898, | Dec 27 1986 | Sony Corporation | Method and apparatus for preventing copying of an optical disk |
5311498, | Feb 28 1991 | Olympus Optical Co., Ltd. | Recording and reproducing apparatus provided in each data block with a secret information number |
5400319, | Oct 06 1993 | Digital Audio Disc Corporation | CD-ROM with machine-readable I.D. code |
5541904, | Nov 29 1994 | Sony Corporation; Digital Audio Disc Corporation | CD-ROM with machine-readable I.D. code |
5570339, | Jul 22 1993 | Victor Company of Japan, Ltd. | Optical disc and a recording and/or reproducing apparatus having copy-protection function |
5592454, | Aug 17 1993 | Sony Corporation | Data reproducing apparatus which replaces vendor unique identification data in response to a reference error correction rate which is lower than that used for replacement of other data |
5608718, | Apr 08 1993 | Sonopress Produktionsgesellschaft fur Ton- und Informationstrager mbH | Disk-shaped optical storage medium exhibiting an identification mark, and method of making such a storage medium |
5617408, | Oct 21 1994 | JVC Kenwood Corporation | Optical recording medium having a disc with deformed pits |
5650991, | Apr 19 1991 | SONY CORPORATION, A CORP OF JAPAN | Magneto-optical disc having preformatted information to prevent unauthorized data duplication |
5654950, | May 10 1994 | NEC Corporation | Method for protecting data recorded on a partial read-only memory (ROM) medium from unauthorized copying |
5671202, | Dec 20 1991 | UPPY, INC | Apparatus and method for data security in an optical disk storage system |
5671205, | Sep 28 1994 | SINGULUS MASTERING B V | Compact disc comprising an antipiracy marking and method of providing compact discs with an antipiracy marking |
5696757, | Jul 29 1993 | JVC Kenwood Corporation | Optical disc, device for checking optical disc and device for recording information on optical disc |
5703858, | Jan 23 1995 | Sony Corporation; Digital Audio Disc Corporation | System for encoding a glass master to enable detection of a counterfeit optical CD-ROM |
5703859, | Sep 01 1995 | Sony Corporation | Digital video copy protection system |
5706266, | Dec 20 1991 | Eastman Kodak Company | Apparatus and method for data security in an optical disk storage system |
5751671, | Apr 26 1994 | HITACHI CONSUMER ELECTRONICS CO , LTD | Information recording media and optical disk, disk having specific data so that a visible pattern of characters or graphics appear on a copy disk |
5761301, | Nov 17 1994 | Panasonic Corporation | Mark forming apparatus, method of forming laser mark on optical disk, reproducing apparatus, optical disk and method of producing optical disk |
5787068, | Nov 07 1996 | Imation Corporation | Method and arrangement for preventing unauthorized duplication of optical discs using barriers |
5790499, | May 10 1994 | NEC Corporation | Method for protecting data recorded on a partial read-only memory (ROM) medium from unauthorized copying |
5805549, | Oct 06 1993 | Sony Corporation; Digital Audio Disc Corporation | Using defect read from a disk to represent a machine-readable code |
5805551, | Apr 18 1994 | Matsushita Electric Industrial Co., Ltd. | Method and apparatus for preventing illegal copy or illegal installation of information of optical recording medium |
5807640, | Dec 28 1993 | Matsushita Electric Industrial Co., Ltd. | Optical recording medium, reproducing system, method of reproducing optical disk, method of fabricating optical disk original record, and method of stopping illegal program operation |
5809006, | May 31 1996 | SAMSUNG ELECTRONICS CO , LTD | Optical disk with copy protection, and apparatus and method for recording and reproducing same |
5809545, | Sep 30 1994 | Victor Company of Japan, Ltd. | Optical disc for a master key, and a method and apparatus for optical-disc information management which inhibit and permit reproduction of main information from an illegal copy disc by using physical and logical security information |
5812501, | Jun 27 1995 | MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD | Optical recording medium having a non-volatile identification code and method for encoding data using same |
5812512, | Aug 17 1993 | Sony Corporation | Data reproducing apparatus which prohibits illegitimate access to data using an internal ID |
5815484, | Dec 24 1996 | WELDON, JAMES T | Copy protectable optical media device and methodology therefor |
5828754, | Feb 26 1996 | Hewlett-Packard Company | Method of inhibiting copying of digital data |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 06 1997 | GARCIA, BEN | DENON CORPORATION U S A | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 008668 | /0838 | |
Aug 12 1997 | Denon Digital LLC | (assignment on the face of the patent) | / | |||
Dec 03 2001 | Denon Corporation USA | Denon Digital LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012354 | /0171 |
Date | Maintenance Fee Events |
May 30 2007 | REM: Maintenance Fee Reminder Mailed. |
Nov 11 2007 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Nov 11 2006 | 4 years fee payment window open |
May 11 2007 | 6 months grace period start (w surcharge) |
Nov 11 2007 | patent expiry (for year 4) |
Nov 11 2009 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 11 2010 | 8 years fee payment window open |
May 11 2011 | 6 months grace period start (w surcharge) |
Nov 11 2011 | patent expiry (for year 8) |
Nov 11 2013 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 11 2014 | 12 years fee payment window open |
May 11 2015 | 6 months grace period start (w surcharge) |
Nov 11 2015 | patent expiry (for year 12) |
Nov 11 2017 | 2 years to revive unintentionally abandoned end. (for year 12) |